Results 81 to 90 of about 8,344 (213)

Spoiled Onions: Exposing Malicious Tor Exit Relays

open access: yes, 2014
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core  

Ghera: A Repository of Android App Vulnerability Benchmarks

open access: yes, 2017
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven   +4 more
core   +1 more source

A Comprehensive Review of Additive Manufacturing for Space Applications: Materials, Advances, Challenges, and Future Directions

open access: yesAdvanced Engineering Materials, Volume 27, Issue 22, November 2025.
Additive manufacturing (AM) transforms space hardware by enabling lightweight, high‐performance, and on‐demand production. This review outlines AM processes—powder bed fusion (PBF), directed energy deposition (DED), binder jetting (BJ), sheet lamination (SL), and material extrusion (ME)—applied to propulsion, satellite structures, and thermal devices ...
Stelios K. Georgantzinos   +8 more
wiley   +1 more source

HiPass: Hijacking CTAP in Passkey Authentication

open access: yesIEEE Access
Passkeys are designed to enhance the security and convenience of authentication by leveraging Fast Identity Online (FIDO) and Web Authentication (WebAuthn) protocols and utilizing credential information stored on user devices to securely complete the ...
Donghyun Kim   +3 more
doaj   +1 more source

Stealthy Deception Attacks Against SCADA Systems

open access: yes, 2017
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values ...
A Kleinmann   +12 more
core   +1 more source

Learning-based attacks in cyber-physical systems [PDF]

open access: yes, 2020
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems---the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides the sensor readings and the controller ...
Franceschetti, Massimo   +3 more
core   +1 more source

A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao   +6 more
wiley   +1 more source

Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol

open access: yesNetwork
The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities.
Mohammad Emran Hashimyar   +3 more
doaj   +1 more source

Guardians of the Network: An Ensemble Learning Framework With Adversarial Alignment for Evasive Cyber Threat Detection

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin   +2 more
wiley   +1 more source

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

open access: yes, 2016
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy